<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Method of Binary Detection of Small Unmanned Aerial Vehicles</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Denys</forename><surname>Bakhtiiarov</surname></persName>
							<email>bakhtiiaroff@tks.nau.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="department">State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</orgName>
								<address>
									<addrLine>3 Maksym Zaliznyak</addrLine>
									<postCode>03142</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Kosmonavta Komarova ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bohdan</forename><surname>Chumachenko</surname></persName>
							<email>bohdan.chumachenko@npp.nau.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Kosmonavta Komarova ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Lavrynenko</surname></persName>
							<email>oleksandrlavrynenko@tks.nau.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Kosmonavta Komarova ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Chumachenko</surname></persName>
							<email>serhii.chumachenko@npp.nau.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Kosmonavta Komarova ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vitalii</forename><surname>Kurushkin</surname></persName>
							<email>vitaliy.kurushkin@npp.nau.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Kosmonavta Komarova ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>February 28</addrLine>
									<postCode>2024</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Method of Binary Detection of Small Unmanned Aerial Vehicles</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">9D62387DB17C2D3EA5AC144F56267435</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Binary detection, signal processing, spectral analysis, detection accuracy, airspace monitoring 0000-0003-3298-4641 (D. Bakhtiiarov)</term>
					<term>0000-0002-0354-2206 (B. Chumachenko)</term>
					<term>0000-0002-3285-7565 (O. Lavrynenko)</term>
					<term>0009-0003-8755-5286 (S. Chumachenko)</term>
					<term>0009-0000-4411-0509 (V. Kurushkin)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This research offers a method for detecting Small Unmanned Aerial Vehicles (sUAVs) in binary using state-of-the-art technology and signal processing techniques. The proposed method combines machine learning and signal analysis techniques to reliably determine the presence of sUAVs in a particular airspace. Pattern recognition, real-time data processing, and spectral analysis are the three primary phases of the approach. Qualitative characteristics of sUAV signals can be identified by spectral analysis. The system can learn and identify these properties and make judgments regarding the presence or absence of sUAVs thanks to the application of machine learning methods. Furthermore, the system's ability to recognize common patterns of sUAV activity is improved by the integration of pattern recognition. Processing data in real-time guarantees system responsiveness and lowers the number of false signals. The efficiency of the suggested sUAV detection system is strongly demonstrated by experimental results acquired in a variety of environmental circumstances. This highlights how the system can improve airspace monitoring measures' effectiveness and safety.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Let's consider the task of binary detection of small-sized targets against the background noise of the receiving channel of an active radar system from the perspective of the statistical hypothesis testing theory in the presence of interference. Initially, let's assume that the movement parameters of the UAV are known <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>, hence the form of the useful signal is known. Similar tasks were addressed by many authors when developing algorithms to detect signals of a known form, which comprise a bunch of received radio pulses, against the backdrop of additive Gaussian noise <ref type="bibr" target="#b3">[4]</ref>. In this section, we examine the task of detecting a small-sized moving target by processing a set of n amplitude beat signals in an FMCW radar, determined for each probing FMCW radio signal over a specific observation interval t = [0; T].</p><p>The amplitude of the i th beat signal corresponds to the i th probing FMCW radio pulse in the series <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problem Statement</head><p>The formulation of this task is determined by the specific nature and technical implementation of receiving channels in typical ground-based shortrange active radars with probing FMCW radio signals. In such contemporary digital radars, for each probing FMCW radio signal, signal beat CEUR Workshop Proceedings ceur-ws.org ISSN 1613-0073 samples from the output of the analog-digital converter are processed <ref type="bibr" target="#b5">[6]</ref>. This processing involves calculating the Fast Fourier Transform, followed by delineating the amplitude spectrum to determine the distance to relevant objects <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. Such objects could be a background surface of a particular type. Hence, a distinctive feature of the method discussed in this subsection is the processing of a set of amplitude samples of signals reflected from background surfaces or objects included in a burst of radio pulses.</p><p>First, let's determine the probability density of instantaneous signal values at the detector's input both in the presence and absence of UAVs <ref type="bibr" target="#b8">[9]</ref>.</p><p>During the observation time</p><formula xml:id="formula_0">  0; t T =</formula><p>, such amplitude variation of the radio signal is represented by the time function () At  . This time function</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>()</head><p>At  contains information about the presence of UAVs. Therefore, we'll consider () At  it as the useful signal at the detector's input. Let's first address the task of detecting UAVs for a specific set of model parameters, described by expression (1).</p><p>Let's assume that the detector's input receives an additive mixture of the useful signal () At  and the noise of the receiving path, which we will consider as Gaussian and delta-correlated. As inferred from the materials presented earlier, the power of the useful signal exceeds the power of the additive noise of the receiving path by 25-30 dB <ref type="bibr" target="#b5">[6]</ref>. Under these conditions, the density distribution of the envelope of the observed radio signal follows a normal law with an average value equal to the instantaneous value of the useful signal envelope. Let's represent the observed signal Y(t) as the sum of the useful signal ()</p><formula xml:id="formula_1">At </formula><p>and the receiving path noise n(t):</p><formula xml:id="formula_2">( ) ( ) ( ) Y t A t n t  = + .<label>(1)</label></formula><p>In <ref type="bibr" target="#b9">[10]</ref>, it is demonstrated that the effective scattering surface of the background during the observation of the useful signal acts as a stationary Gaussian random process. The temporal correlation interval of this process is considerably shorter than the duration of the observed useful signal. As a first approximation, we'll describe the correlation function of the Gaussian random process using a delta function. As can be inferred from expression <ref type="bibr" target="#b0">(1)</ref>, random variations in the background's RCS lead to a multiplicative transformation of the useful signal () At  , meaning they act as multiplicative interference. The background's RCS,  (   , is nonlinearly incorporated into the amplitude expression of the reflected signal, as described by expression (1) (through the square root).</p><p>Let's determine the density distribution of the square root of the RCS and subsequently the density distribution of the amplitude of the reflected signal.</p><p>It's well-known that a nonlinear transformation of a random variable results in the alteration of its distribution law in the following way <ref type="bibr" target="#b10">[11]</ref>:</p><formula xml:id="formula_3">() ( ) [ ( )] d B W B W X B dB  = =   ,<label>(2)</label></formula><p>where () WXis the normal probability density distribution of the random variable X.   B =  (   , and the density distribution of instantaneous RCS values at a certain point in time is described by a Gaussian law:</p><formula xml:id="formula_4">2 1 2 1 () 2 f f f f m f W e     −   −        =   ,<label>(3)</label></formula><p>where f m  is the average RCS of the background (</p><formula xml:id="formula_5">0 f f m  =</formula><p>), in square meters; σ represents the root mean square deviation of instantaneous RCS values of the background over the observation time of the useful signal, in square meters <ref type="bibr" target="#b11">[12]</ref>.</p><p>In this expression, to simplify the notation, bi-static angle designations 2 b  and 2 b  have been omitted. In general, they are functions of time during the observation of the useful signal () At  . However, in the context discussed, variations of the mentioned bi-static angles do not result in changes to the background RCS as described by expression <ref type="bibr" target="#b1">(2)</ref>.</p><p>The random variations in the background RCS f  over the observation time of the useful signal can be represented as the sum of the average value</p><formula xml:id="formula_6">0 f  and the fluctuation component f  : 0 f f f   =  +  . (<label>4</label></formula><formula xml:id="formula_7">)</formula><p>The multiplicative nature of interference about the useful signal arises from fluctuations in the RCS (Radar Cross-Section) of the background. However, the average value of the background's RCS doesn't distort the shape of the useful signal.</p><p>The probability density distribution of the fluctuating component of the background RCS can be written as <ref type="bibr" target="#b12">[13]</ref>:</p><formula xml:id="formula_8">2 1 2 1 () 2 f f f f W e          −             =   . (5)</formula><p>Expressing the random variable X through B and calculating the derivative, we obtain:</p><formula xml:id="formula_9">2 () ( ) , 2 d B X B B B dB  =  = =  .<label>(6)</label></formula><p>From this, we derive the sought distribution law of the square root from RCS:</p><formula xml:id="formula_10">2 2 1 2 2 () 2 f f f Bm B W B e     −   −        =    . (7)</formula><p>The useful signal () At  is the product of the deterministic function () ft and the square root of the random variable R R R , and the antenna gain factor. We consider these changes to be insignificant compared to the influence of the oscillating multiplier () ft. In this case, the non-stationary process is the result of the product of the useful signal The change in dispersion over time, described by expression <ref type="bibr" target="#b7">(8)</ref>, according to the law of the useful signal can be written as follows:</p><formula xml:id="formula_11">f  :   ( ) ( ) 1 ( ) 2 ( ) cos ( ) f f OTR A A A t f t A k t k t t   =   =    + +   <label>(</label></formula><formula xml:id="formula_12">  2 1 2 / ( ) 1 ( ) 2 ( ) cos ( ) 2 f f f f m f A OTR A A f D t A k t k t t e d      −   −       −   =  + +           (9)</formula><p>The probability distribution density of instantaneous values of the useful signal over the observation period can be written as follows <ref type="bibr" target="#b14">[15]</ref>: Regrettably, the integrals in formulas ( <ref type="formula">7</ref>)-( <ref type="formula">9</ref>) cannot be expressed in terms of elementary functions and can only be determined by numerical integration.</p><formula xml:id="formula_13">    2 2 / 1 2 1 ( ) 2 ( ) cos / 2 ( , ) 1 ( ) 2 ( ) cos ( ) 2 f OTR A A f f Am A k t k t OTR A A A W A t e A k t k t t      −   −      + +              + +        (10)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method of Binary Detection of SUAV</head><p>The useful signal () At  , modulated by multiplicative interference, is observed against the backdrop of additive Gaussian noise in the reception path. The noise correlation interval of the reception path does not exceed one microsecond. The duration of the useful signal is in the order of seconds <ref type="bibr" target="#b15">[16]</ref>. Hence, disregarding the correlated noise samples n(t), we regard it as white Gaussian noise with a zero mean value and a probability distribution density of instantaneous values:</p><formula xml:id="formula_14">2 1 2 1 () 2 n n n n W n e  −    =     . (<label>11</label></formula><formula xml:id="formula_15">)</formula><p>Where σn is the root mean square deviation of the noise measurements in the receiving system.</p><p>The random process () At  is independent of the receiving system noise. The probability density function of the instantaneous values of the process () Ytfrom formula (1), represented as the sum of two independent random processes, is determined by the convolution of the probability density of the receiving system noise, described by expression <ref type="bibr" target="#b10">(11)</ref>, and the probability density of the useful signal, described by expression <ref type="bibr" target="#b9">(10)</ref>, as follows:</p><formula xml:id="formula_16">( , ) ( , ) ( ) A n W Y t W Y n t W n dn   − = −   . (<label>12</label></formula><formula xml:id="formula_17">)</formula><p>Or, taking into account <ref type="bibr" target="#b9">(10)</ref> and <ref type="bibr" target="#b10">(11)</ref>, we obtain:</p><formula xml:id="formula_18">2 2 2 2<label>2 2 ( ) ( ) 1 1 2 ( ) 2 ( )</label></formula><p>( , ) ()</p><formula xml:id="formula_19">f f n n f f f Y n m Y n m n n f t f t n Y e dn n e dn W Y t ft             − − − −             − + − +                                   − −   −  =       <label>(13)</label></formula><p>The density function described by formula (13) of the instantaneous values of the observed signal () Ytat the input of the detector characterizes a non-stationary random process with time-varying variance due to the motion of the target relative to the background surface <ref type="bibr" target="#b15">[16]</ref>.</p><p>It is known that the detection of small targets is based on the processing of the observed signal. In this case, the samples of such a signal are the amplitudes of LFM radio pulses observed over a time interval</p><formula xml:id="formula_20">  0, t T </formula><p>. The optimal signal detection algorithm will be sought based on the minimum average risk criterion, taking into account which leads to the determination of a specific expression of the likelihood ratio.</p><p>The density distribution described by formula (13) of the instantaneous values of the observed signal () Ytat the detector's input characterizes a non-stationary random process with timevarying variance due to the target's movement relative to the background surface.</p><p>It is known that the detection of small targets is based on the processing of the observed signal. In this case, the samples of such a signal are the amplitudes of the LFMC radio pulse batch observed over the time interval</p><formula xml:id="formula_21">  0, t T </formula><p>. The optimal algorithm for detecting the useful signal will be sought based on the minimization of the average risk, the consideration of which leads to the determination of a specific expression for the likelihood ratio <ref type="bibr" target="#b16">[17]</ref>.</p><formula xml:id="formula_22">1 0 ( / ) () ( / ) W Y H LY W Y H = . (<label>14</label></formula><formula xml:id="formula_23">)</formula><p>Hypothesis H₁ corresponds to the case of the UAV's movement in front of the background surface, where the radio signal reflected from the background is modulated by the reflected radio signal from the UAV. The model of the signal observed at the detector's input under the assumption of the validity of the hypothesis 1 H is described by the following expression:</p><formula xml:id="formula_24">  / / 2 2 2 2 ( ) ) 1 ( ) 2 ( ) cos ( ) ) ( ) OTR f b b A A OTR f b b Y t A k t k t t A f t =   (    + +    =   (   <label>(15)</label></formula><p>The randomness of the process </p><formula xml:id="formula_25">2 2 /2 2 1 1 () 2 1 / 1 2 ( / , ) () 2 n i f i OTR i f f Ym n ft A i i i OTR Y W Y H t e ft A   =   −   −       =   =       <label>(16)</label></formula><p>Hypothesis H₀ corresponds to the case of receiving a radio signal reflected from the background. The model of the signal observed at the detector's input under the assumption of the validity of the hypothesis 1 H is described by the following expression:</p><formula xml:id="formula_26">/ / 2 2 2 2 ( ) ) ) OTR f b b OTR f b b Y t A A =   (   =   (  <label>(17)</label></formula><p>The density distribution of the sample Y under the assumption of hypothesis H₀, in this case, is stationary, and, following a similar pattern to expressions <ref type="bibr" target="#b9">(10)</ref> and <ref type="bibr" target="#b10">(11)</ref>, it is expressed as follows:</p><formula xml:id="formula_27">2 2 /2 2 1 1 ( ) 2 0 / 1 2 ( / ) 2 n i f OTR i f f Ym n A i i OTR W Y H Y e A   = − −   =   =      <label>(18)</label></formula><p>Substituting the conditional probability density functions ( <ref type="formula" target="#formula_25">16</ref>) and ( <ref type="formula" target="#formula_26">17</ref>) into <ref type="bibr" target="#b17">(18)</ref>, we obtain:</p><formula xml:id="formula_28">2 2 /2 2 1 2 2 /2 2 1 1 () 2 / 1 1 ( ) 2 / 1 2 () 2 () 2 2 n i f i OTR i f f n i f OTR i f f Y m n n ft A i i i OTR n Y m n A i i OTR Y e ft A LY Ye A   =   =   −   −       =  − −   =                 =                  (<label>19</label></formula><formula xml:id="formula_29">)</formula><p>The obtained expression describes the desired likelihood ratio for the problem of detecting UAVs in the case of multiplicative interaction between a known useful signal and amplitude fluctuations of the background.</p><p>The algorithm for detecting UAVs involves comparing the expression ( <ref type="formula" target="#formula_28">19</ref>), () LY , with a certain threshold 0  . We simplify the optimal detection algorithm described by formula <ref type="bibr" target="#b18">(19)</ref> through logarithmization.</p><formula xml:id="formula_30">  2 2 2 2 2 2 2 1 1 1 1 1 /2 2 1 1 ( ) 2 1 ( ) ( ) ( ) ln ( ) ln ( ) 2 f f f f n n n n i i i n i i i i i i i i i OTR m Y Y n m m Y f t f t f t L Y f t A    = = = = − =          + − +  +    −                   = −           (20)</formula><p>Therefore, the optimal algorithm for UAV detection based on the Bayesian criterion, considering the multiplicative interaction between a known useful signal and amplitude fluctuations of the background, takes the following form <ref type="bibr" target="#b16">[17]</ref>:</p><formula xml:id="formula_31">4 4 2 2 1 1 1 /2 2 1 2 1 ( ) ( ) 2 f f n n n i i i i i i i i OTR Y Y m Y f t f t z A  = = =    − −    −     =       where 1 0 () () H i H i zt zt         1 1 1 0 /2 2 1 ( ) ln ( ) ln 2 f n i i i OTR AB z t f t A −  =  − = − +     </formula><p>-the modified threshold of the detector,</p><formula xml:id="formula_32">2 1 1 2 1 () f f n i i m A ft B n m  =   =    =  .<label>(21)</label></formula><p>In the case of discrete sampling of observations () Ytat the detector's input, it follows from expression (21) that to decide the presence of a signal caused by UAV at the detector's input, a series of operations involving the summation of nonlinearly transformed samples from the observed realization () Ytand the multiplication of the square of the realization () Ytwith a copy of the expected useful signal, followed by summation of the obtained results and comparison with a threshold, should be performed <ref type="bibr" target="#b15">[16]</ref>.</p><p>A distinctive feature of the modified detector threshold</p><formula xml:id="formula_33">() i zt </formula><p>is its time dependency proportional to the expected signal due to the non-stationary nature of the random process. When the threshold level is exceeded, the presence of the moving UAV is confirmed; otherwise, a decision is made about its absence <ref type="bibr" target="#b16">[17]</ref>.</p><p>The structure of the optimal detector for detecting a moving UAV under the considered conditions is depicted in Fig. <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Structural diagram of the optimal detector for UAV with known motion parameters</head><p>The structural diagram of the optimal detector does not show the synchronization device responsible for clocking the detector blocks. Since the additional phase shift during the reflection of the radio signal by the target and the background surface is random, it is necessary to add a second quadrature channel to the structural diagram presented in Fig. <ref type="figure" target="#fig_7">2</ref>.16, where the function () ft is defined with a phase shift of π/2 relative to the initial phase of the () ft function.</p><p>The detection algorithm for UAV ( <ref type="formula" target="#formula_32">21</ref>) is expedient to implement in the digital processing block of the amplitude signals received in the pulse sequence. However, for the implementation of this algorithm, including setting the threshold, precise knowledge of parameters such as the coordinates (angular position) of the phase center (point) of the background surface reflection, the values of current bistatic angles, the three-dimensional shape of the bistatic RCS of the target and background, is required. Furthermore, the start time of the UAV flight relative to the "radar-background" line of sight is unknown. In the conditions of a priori uncertainty about these parameters, the application of known approaches to eliminate this uncertainty significantly complicates the above algorithm and the structural diagram of the optimal detector <ref type="bibr" target="#b17">[18]</ref>. To obtain a practically implementable UAV detection algorithm, we will make a series of simplifications relative to the observation model ()</p><p>Yt. These simplifications will lead to the implementation of a quasioptimal detection algorithm.</p><p>We will consider the model of the observed input signal of the detector on the interval [0, T] as an additive sum of a non-random useful signal and Gaussian noise limited to b f  in bandwidth:</p><formula xml:id="formula_34">  ( ) 1 ( ) 2 ( ) cos ( ) ( ) OTR A A Y t A k t k t t n t = + +    +<label>(22)</label></formula><p>For such an observation model, the detector design has been explored by numerous authors <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20]</ref>. Let's briefly outline the results of solving this problem. We will assume that the data observation sampling interval is</p><formula xml:id="formula_35">1 2 b t f = </formula><p>.</p><p>For the likelihood ratio ( <ref type="formula" target="#formula_34">22</ref>), the probability density in the presence of a signal 1 H is expressed as follows:</p><formula xml:id="formula_36">22 /2 2 1 1 () 2 1 / 1 2 ( / ) 2 n i f OTR i f f Ym n A i i OTR W Y H Y e A   = − −   =   =        (23) 2 1 2 1 () 2 n n n n W n e  −    =    . (<label>24</label></formula><formula xml:id="formula_37">)</formula><p>Where σn is the root mean square deviation of the noise samples in the receiving path.</p><p>Under these conditions, the expression for the likelihood ratio will be written in a known manner <ref type="bibr" target="#b18">[19]</ref>:</p><formula xml:id="formula_38">2 0 0 1 1 2 () n n i i i i i t t A Y A N N L Y e e = =   −    =  . (<label>25</label></formula><formula xml:id="formula_39">)</formula><p>The formula can be alternatively expressed as a likelihood ratio functional, which Instead of comparing it to the threshold of the likelihood ratio or function, we can compare the logarithms of expressions (25) or (26). Thus, we obtain the following decision rule for the considered detection problem <ref type="bibr" target="#b20">[21]</ref>:</p><formula xml:id="formula_40">0 0 2 ( ) ( ) T z Y t A t dt N =  1 0 () () H H zt zt         . (<label>26</label></formula><formula xml:id="formula_41">)</formula><p>The formula</p><formula xml:id="formula_42">0 0 ( ) ln y E zt N  =  +</formula><p>represents the modified threshold. Therefore, the detection device for a moving small-sized target under these conditions corresponds to the wellknown correlation receiver scheme depicted in Fig. <ref type="figure" target="#fig_7">2</ref>.</p><p>The synchronization device ensures coordinated operation between the reference generator and the integrator, facilitating the comparison of its output signal () zt with the threshold. To ensure the functionality of the correlation detector, it is necessary to multiply the reference and observed signals at coincident time points. However, the arrival time of the observed signal is unknown. In this case, the reference signal of the correlation detector should be time-shifted relative to the observed signal, and a procedure for searching and capturing the useful signal should be performed. To simplify this procedure, instead of a correlation detector for the useful signal, its version with matched filters should be used. When the useful signal's time coincides with the impulse response of the matched filter, the value of the correlation integral will match the amplitude of the output signal of the matched filter. The impulse response of the matched filter () h  for the useful signal () At is its mirrored copy, shifted in time by t₀. The structural diagram of the UAV detector with known parameters of its motion using matched filters is shown in Fig. <ref type="figure" target="#fig_8">3</ref>.   (28)</p><p>In this case, processing the observed signal in the small-sized target detection task will involve comparing it to a threshold using the following decision statistic:</p><formula xml:id="formula_43">2 2 0 0 ( ) ( ) ( ) ( ) ( ) c s z t Y t A t d Y t A t d   − −     = −   + −             , (<label>29</label></formula><formula xml:id="formula_44">)</formula><p>where () Yt is the observed realization of the signal at the input of the detector. The structural diagram of the quadrature detector for the UAV with known parameters of its motion using matched filters is shown in Fig. <ref type="figure">4</ref>  <ref type="bibr" target="#b4">[5]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>WB</head><label></label><figDesc>is the sought-after probability density distribution of the random variable A.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>nonstationarity of the random process () At  is due to the variability of the variance ( ) ft times, leading to a change in the scale of the probability density distribution ( ) f W  .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>Ytis determined by the function f(t), which accounts for the non-stationary nature of the sample distribution density Y under the condition of UAV movement. Assuming that the correlation interval of RCS fluctuations is much smaller than the duration of the useful signal, we can express the density distribution of sample values Y under the presence of a moving UAV as follows:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>power density of the noise in the receiving system.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Structural diagram of the correlation detector for UAV with known parameters of its motion and initial phase</figDesc><graphic coords="8,70.90,189.92,219.45,87.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Structural diagram of the UAV detector using a matched filter with known parameters of its motion and initial phase The reference signal () At has a random initial phase due to the reflection of radio waves from the target, underlying surfaces, and background. When radio waves are reflected from these objects, an additional phase shift becomes random.To eliminate the dependence of the reference signal on the influence of random phase shifts during the reflection of radio waves, we use a structural scheme of a detector for a signal of known shape with a random initial phase. In this scheme, the detector</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head></head><label></label><figDesc>depend on time:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,191.15,594.96,459.74" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="9,72.00,78.00,433.88,145.25" type="bitmap" /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>Thus, if the motion parameters of the UAV are known and the background reflection characteristics are sufficiently stable, the detector can be represented by a correlation scheme or a scheme with matched filters.</p><p>The structural scheme of the SUAV useful signal detection device for the background radar based on parallel matched filters is developed.</p><p>Based on approximations of the widths of functions describing the change in the amplitude of the matched filter response at the mismatch in the parameters of the useful signal, the method and algorithm for calculating the number of matched filters of the IBPLA detector for the background radar are obtained.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Small Target Detection for Unmanned Aerial Vehicle Images Based on YOLOv5l</title>
		<author>
			<persName><forename type="first">S</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISCTech58360.2022.00042</idno>
	</analytic>
	<monogr>
		<title level="m">10 th International Conference on Information Systems Computing Technology</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="210" to="214" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<idno type="DOI">10.1109/picst54195.2021.9772161</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 8 th International Conference on Problems of Infocommunications</title>
				<imprint>
			<publisher>Science and Technology</publisher>
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Last Mile Technique for Wireless Delivery System using an Accelerating Lens</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
		<idno type="DOI">10.1109/picst51311.2020.9467886</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Problems of Infocommunications</title>
				<imprint>
			<publisher>Science and Technology</publisher>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">An Improved CornerNet-Lite Method for Pedestrian Detection of Unmanned Aerial Vehicle Images</title>
		<author>
			<persName><forename type="first">X</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Xue</surname></persName>
		</author>
		<idno type="DOI">10.1109/CAC53003.2021.9728245</idno>
	</analytic>
	<monogr>
		<title level="j">China Automation Congress</title>
		<imprint>
			<biblScope unit="page" from="2322" to="2327" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Wavelet-Based Steganographic Method for Text Hiding in an Audio Signal</title>
		<author>
			<persName><forename type="first">O</forename><surname>Veselska</surname></persName>
		</author>
		<idno>doi: 0.3390/s22155832</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page">5832</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Deep Learning Methods Application for Object Detection Tasks Using Unmanned Aerial Vehicles</title>
		<author>
			<persName><forename type="first">A</forename><surname>Babaryka</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSET55632.2022</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 16 th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="808" to="811" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4-2.5 GHz Range</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-43070-2_29</idno>
	</analytic>
	<monogr>
		<title level="j">Data-Centric Business and Applications</title>
		<imprint>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="675" to="709" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers, in: 5 th</title>
		<author>
			<persName><forename type="first">I</forename><surname>Bogachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632151</idno>
	</analytic>
	<monogr>
		<title level="m">International Scientific and Practical Conference Problems of Infocommunications</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="581" to="585" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Video Channel Suppression Method of Unmanned Aerial Vehicles</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Platonenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/ELNANO54667.2022.9927105</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 41 st International Conference on Electronics and Nanotechnology</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="473" to="477" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A Novel Spatiotemporal Saliency Method for Low-Altitude Slow Small Infrared Target Detection</title>
		<author>
			<persName><forename type="first">D</forename><surname>Pang</surname></persName>
		</author>
		<idno type="DOI">10.1109/LGRS.2020.3048199</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Geoscience and Remote Sensing Letters</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Procedure for Failures Diagnostics of Aviation Radio Equipment</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACIT58437.2023.10275337</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advanced Computer Information Technologies</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="100" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Protected System of Radio Control of Unmanned Aerial Vehicle, 4 th</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bakhtiiarov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Konakhovych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lavrynenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSNMC.2016.7783141</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Methods and Systems of Navigation and Motion Control</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="196" to="199" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An Approach to Modernization of the Hat and COST 231 Model for Improvement of Electromagnetic Compatibility in Premises for Navigation and Motion Control Equipment</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bakhtiiarov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Konakhovych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lavrynenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSNMC.2018.8576260</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 5 th International Conference on Methods and Systems of Navigation and Motion Control</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="271" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Spatial Cognition-Driven Deep Learning for Car Detection in Unmanned Aerial Vehicle Imagery</title>
		<author>
			<persName><forename type="first">J</forename><surname>Yu</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCDS.2021.3124764</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cognitive and Developmental Systems</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1574" to="1583" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Self-Attention Guidance and Multiscale Feature Fusion-Based UAV Image Object Detection</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1109/LGRS.2023.3265995</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Geoscience and Remote Sensing Letters</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Prediction of the Final Discharge of the UAV Battery Based on Fuzzy Logic Estimation of Information and Influencing Parameters</title>
		<author>
			<persName><forename type="first">V</forename><surname>Larin</surname></persName>
		</author>
		<idno type="DOI">10.1109/KhPIWeek57572.2022.9916490</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE 3 rd KhPI Week on Advanced Technology</title>
		<imprint>
			<biblScope unit="page" from="1" to="6" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A Review of Security Incidents and Defence Techniques Relating to the Malicious Use of Small Unmanned Aerial Systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Swinney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Woods</surname></persName>
		</author>
		<idno type="DOI">10.1109/MAES.2022.3151308</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Aerospace and Electronic Systems Magazine</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="14" to="28" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Improving the Performance of Seabirds Detection Combining Multiple Semantic Segmentation Models</title>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhu</surname></persName>
		</author>
		<idno type="DOI">10.1109/IGARSS39084.2020.9324102</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Geoscience and Remote Sensing Symposium</title>
				<meeting><address><addrLine>Waikoloa</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1608" to="1611" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Ridge Detection and Perceptual Grouping Based Automatic Counting of Rice Seedlings Using UAV Images, 6 th</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ni</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICIVC52351.2021.9526939</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Image, Vision and Computing</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="61" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Infrared Small UAV Target Detection Based on Residual Image Prediction via Global and Local Dilated Residual Networks</title>
		<author>
			<persName><forename type="first">H</forename><surname>Fang</surname></persName>
		</author>
		<idno type="DOI">10.1109/LGRS.2021.3085495</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Geoscience and Remote Sensing Letters</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Highway Crack Segmentation from Unmanned Aerial Vehicle Images Using Deep Learning</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hong</surname></persName>
		</author>
		<idno type="DOI">10.1109/LGRS.2021.3129607</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Geoscience and Remote Sensing Letters</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
